Upcoming Webcasts

On-Demand Webcasts

Vendor Webcast

Dealing with the Storm – The U.K.’s 2017 Data Threat Landscape

Enterprises in U.K. are experiencing a storm of global proportions around their data – It starts with a growing need for data to power business growth, and expands with strict regulatory requirements, advanced technology deployments and escalating cyber-attacks – and it’s putting their data at risk.

In this webinar we’ll look deeply into the results for the 5th annual 2017 Thales Data Threat report, with a focus on the results for the U.K. and comparisons against global competitors. Learn both about the threats, but also about what enterprises are doing about them – and best practice recommendations from IT security analysts at 451 Research.

How data breaches keep growing in spite of increased IT security spend – and what some of the reasons for that trend are

How advanced technologies such as Containers, IoT, Big Data and Cloud change the required approach to protecting critical and sensitive information

How new data privacy regulations are shaping enterprise plans for data security

What barriers enterprises encounter to deploying and using data security tools – and how to overcome them

Vendor Webcast

Your GDPR Plan: 4 Steps to Bolster Security & Meet Compliance

25th May, 2018, will mark the enforcement of the first comprehensive overhaul of European data protection legislation in over twenty years. The critical date is looming ever closer, and the amount of attention on the General Data Protection Regulation and speculation over whether some of the world’s largest organisations will meet the deadline is growing rapidly.
And deservedly so, it’s a big deal. Ultimately, the GDPR will impact both your organisation and the way you think about its security. But where do you start? What should organisations be doing to ensure that they are taking positive steps towards compliance, but also generating enough urgency internally to be able to achieve this goal?
Join Hadi Hosn, Head of Security Strategy and GRC Consulting and Resident GDPR Practitioner in EMEA for SecureWorks, as he reviews the GDPR basics, what they mean for your business, and the steps you can be taking now on your journey to compliance. Whether you are just starting to think about GDPR, looking for help on where to go next, or raising awareness and reinforcing the importance of the GDPR in your organisation, this webcast is for you.
In this webcast you will learn:

Vendor Webcast

Using Augmented Intelligence to address the human element

Today’s information-rich enterprise needs a 360 view of its data, under 24 hour analysis to spot anomalies and actions that contravene agreed policies and behaviours - in essence the who, what, when and where of your critical data.

And when it comes to the ‘who’, you need to identify and address the human element in your network security to safeguard your organisation, its customers and your staff.

So how do you spot a criminal operating on your network with legitimate credentials, and avoid blaming innocent staff – or catch the malicious staffer gone bad?

By using augmented intelligence to leverage brain power with processing power, combining human experience with machine powered pattern recognition in big data to multiply the results achieved by your best staff.

Vendor Webcast

How to keep the peace between security and development

It’s long been thought that security teams and development are on opposite sides of a battlefield. Security makes it difficult for dev to reach their goals while developers disregard security protocols in favour of speed. However recent research by ESG and Veracode has found that security and development are actually more aligned than we previously thought.

Vendor Webcast

De-Perimeterisation and Going Beyond Multi-Factor Authentication

Once you have multi-factor authentication (MFA) installed, how do you take it further in your overall access control programme?

The idea of getting rid of the perimeter can be intimidating for businesses to contemplate, especially if they’ve only recently solidified one. So let’s not think of it as getting rid of the perimeter, but rather as tightening security on the inside so that the perimeter isn’t the only thing keeping the attacker at bay.

If you’re already in the hybrid environment -- with some of your infrastructure on-premises and some in the cloud -- it’s time to think about re-balancing your security policies, because you already have assets that aren’t within your perimeter.

Vendor Webcast

How to do Flow-Based Security Monitoring at 100G

The ability to detect threats at any speed is a challenge, but with networks now operating at 40G and 100G, these challenges become even more complex. And with a severe lack of commercial offerings capable of meeting industry demands, many enterprises and cloud service providers are driven to build their own security solutions. But how do you build an efficient solution that provides complete traffic visibility at 100G?
Join this webinar to hear ntop founder Luca Deri explain how they helped a global hyperscale Internet company do just that. By developing a 1:1 NetFlow solution with zero packet loss, they successfully enabled complete and efficient traffic visibility, even at 100G.

Vendor Webcast

Threat Intelligence is Dead. Long Live Threat Intelligence!

Threat Intelligence is a very hot topic at the moment and many organisations are looking to establish their own Threat Intelligence capabilities. Everybody wants their own reliable, comprehensive and actionable feed of Threat Intelligence that can inform and bolster their cyber-security controls, but with such a vast multitude of available indicators, how do you make sense of them all?

In this live webcast, Rafe Pilling, Senior Researcher with the SecureWorks Counter Threat Unit (CTU), cuts through the hype to explain firstly, what true Threat Intelligence is, and secondly, how your organisation can effectively integrate Threat Intelligence into your cyber defences.

The volume of threat data can exceed the capacity of even the most skilled security professional. Analysts can reduce hundreds of thousands of security events every day to those that need further investigation, but it still requires a lot of manpower to identify priorities, then analyse, decide and implement appropriate responses. To consider some of the potential solutions to overcome this problem, SC’s editor in chief will be talking to Mike Spradbery, IBM Security's UKI technical leader, to learn how cognitive technologies have the potential to revolutionise the way security analysts work, allowing them to confidently respond to threats at unprecedented speed and scale.

Vendor Webcast

The New Enterprise Security Model: How to Prevent, Detect and Respond

In today’s computing world, the nature of the network perimeter has changed. The threat of data breaches is growing and CISOs are faced with a monumental challenge: securing information wherever it resides, without interfering with the productivity of the increasingly mobile and connected workforce. The ramifications of poor cloud security decisions have become a boardroom issue. In this webinar, we’ll review the current landscape of security challenges and discuss:

Vendor Webcast

Lessons from the field: How are skilled technical testers infiltrating networks?

Many organisations have technical testing performed a couple of times a year for reasons such as identifying network vulnerabilities or satisfying industry compliance requirements. Unfortunately, the results and lessons learned are typically limited. Wouldn't it be interesting to learn about the tactics and techniques the most skilled technical testers out there are utilising across different industries and levels of scope? Think of it as an opportunity to learn from the good guys simulating the bad guys, without your organisation having to suffer a genuine breach.

Join this webcast and hear from two of SecureWorks' most skilled technical testers, Nate Drier and Trenton Ivey, who will share lessons learned from some of their most challenging engagements and the trends they are seeing with clients and their defence practices.

Vendor Webcast

Secure Digital Business Transformation: What every CIO or CISO should know

Digital transformation is a powerful business enabler that is compelling business leaders to fundamentally change their technology ecosystems. However, such a transformation significantly impacts security, network traffic flows, applications, user experience, and cost, which is why it is top-of-mind in C-suites and the boardroom. Digital business transformation is no longer a question of if, but WHEN.

According to IDC, by the end of 2017, two-thirds of CEOs in the Global 2000 will have digital transformation at the centre of their corporate strategies. Enterprises that are able to adapt to this digital transformation will see a sustained competitive advantage over the ones that aren't. How ready is your enterprise?

Join Michael Sutton, CISO of Zscaler, for a compelling webcast discussing the lessons learned and insights gained as a result of leading a number of Global 2000 organisations through a massive cloud transformation

Editorial Webcast

EU GDPR Planning - Prioritising your checklist

Will YOU be EU GDPR compliant on 25th May 2018? If you draw up your plan today you'll have 18 months to implement it. here are no extensions or extenuating circumstances – it's the law and applies to everyone with data on EU citizens.

Brexit won't have happened, so even if the UK eventually draws up ‘adequate' alternative laws, you need to take action now. But what's your priority, and are there any short-cuts? How can encryption reduce your breach reporting liability? Is anonymisation appropriate?

Join our webinar to check your plans against best practice and by attending you will be able to:

Vendor Webcast

Stay out of the headlines: A Planned Path to Reducing Risk

Today's breaches all have a common attack vector – stolen usernames and passwords. Attackers are making major headway into our businesses with simple tactics that exploit our weakest points. It's clear that we need to bolster our defences, but prioritisation can seem daunting.

Join us for this 60 min webcast as we walk through some proven practices for prioritising a risk mitigation strategy. First starting with the easy gaps that most often lead to data breach, and moving to sophisticated and comprehensive control.

Vendor Webcast

Stop Ransomware In Its Tracks

Ransomware has become one of the most widespread and damaging threats internet users face today.

Since CryptoLocker first appeared in 2013, we've seen a new era of file-encrypting ransomware variants delivered through spam messages and exploit kits, extorting money from all types of organisations. And in 2016 alone it's cost over $1 billion.

Gain expert knowledge and learn how ransomware threats work and how to stay secure against them. Join us for this 60 min webcast as we discuss the following:

Editorial Webcast

Breaches or compliance - what's the key driver for security in the cloud?

Early concerns about the security and efficiency of cloud storage are being overcome by the spread of robust solutions, leading to their mainstream acceptance.

Hand in hand with the rise of cloud is the adoption of mobile devices and remote working, which is undermining the hard-won security of cloud solutions by multiplying the number of access points.

It's a complex picture, so how do you present this to the board? Traditionally, achieving minimum compliance standards has been a way to get the board to spend on security or adopt money-saving technology.

And that's fine – until you get hacked. In a classic case of shutting the stable door after the horse has bolted, budgets are suddenly unloosed as the board wakes up to the potential downsides of the technology – whether that be mobile devices or cloud– that they have adopted.

Vendor Webcast

Businesses Held Hostage: Are You Ready for a Ransomware Attack?

No organisation is immune to a ransomware attack. In recent months, nearly half of all malware blocked by Mimecast for its 20,000 customers has been ransomware.

The motivation to pay can be strong, particularly given issues such as criticality of business assets, digital infrastructure, or even safety of life in some cases - but a far better strategy is to be prepared for the threat before ransomware strikes.

How ready is your organisation to face a ransomware attack? Join 451 Research and Mimecast during this webinar to explore:

The impact of ransomware: Just how serious a threat is it?

How could ransomware get into your organisation?

Why is ransomware happening more now than ever before?

How can you best defend against a ransomware attack ... before it locks up your critical information assets?

Vendor Webcast

Activated Charcoal - Making sense of endpoint data

Security operations is all about understanding and acting upon of large amounts of data. When you can pull data from multiple sources, condense it down and correlate across systems, you are able to highlight trends, find flaws and resolve issues.

This webcast will cover the importance of monitoring endpoints and how to leverage endpoint data to detect, respond and neutralise advanced threats.

You'll discover:

Why endpoints are the new perimeter

How employees can strengthen your security operations strategy

Techniques to test and validate security awareness programs

How to take the data that Carbon Black collects, correlate it against thousands of endpoints, and dynamically neutralise threats using the LogRhythm security intelligence and analytics platform

Vendor Webcast

How Trusted Identities can help you accelerate your Digital Business Transformation

We all know that in business today the old perimeter is gone. So too are the days of dealing strictly with your own employees, all housed under one roof. Now your enterprise must provide secure access to employees, customers and partners who work outside the perimeter and who rely on a wide range of cloud apps and mobile devices. The traditional security and enablement solutions built for enterprises with a controllable perimeter, simply will not work. The only truly effective way to solve today's security dilemma is to take an identity-based approach – Trusted Identity.

Vendor Webcast

From Hummingbad to worse - are targeted androids attacks becoming a trend?

Yingmob uses HummingBad to control 10 million devices globally and generate $300,000 per month in fraudulent ad revenue. This steady stream of cash, coupled with a focused organisational structure, proves cyber criminals can easily become financially self-sufficient.

Emboldened by this independence, Yingmob and groups like it can focus on honing their skill sets to take malware campaigns in entirely new directions, a trend Check Point researchers believe will escalate. For example, groups can pool device resources to create powerful botnets, they can create databases of devices to conduct highly-targeted attacks, or they can build new streams of revenue by selling access to devices under their control to the highest bidder.

Join NTT Com Security and Check Point Software Technologies for this webinar and you will learn

What were some of the findings from the research team

What is the risk to organisations from Hummingbad and similar Malware campaigns

Are these types of attacks becoming the most common form of mobile threat

SC Media UK arms cyber-security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face and establish risk management and compliance postures that underpin overall business strategies.